General

  • Target

    Pou.apk

  • Size

    28.4MB

  • Sample

    240122-xq85wadaa3

  • MD5

    725dbf799f4e0953809102fbf7471f9e

  • SHA1

    5bc7cc693b06763d7ddacb52c2b2be78fd770ef0

  • SHA256

    8bcb032467286a2c975eef66f7904dee937635f0ffc9587f7a83b76282a30e31

  • SHA512

    1989ebf112987ab0a0d354fdc766e984630a650dd03ef6f6f3197c55ca0d60f9ecd02c767ce4b85810d1529dffc1324a022f5e3370022b717c79274db2fd6236

  • SSDEEP

    393216:wgi4sUxk7vRiT+huvwd1wtmvBICRkaKgUbs7vCiT9PNo80ptadC9XnYTFwUk5v:Bx+d/ooYtuMaKvQ7vCf80ptadC9XnVNv

Malware Config

Targets

    • Target

      Pou.apk

    • Size

      28.4MB

    • MD5

      725dbf799f4e0953809102fbf7471f9e

    • SHA1

      5bc7cc693b06763d7ddacb52c2b2be78fd770ef0

    • SHA256

      8bcb032467286a2c975eef66f7904dee937635f0ffc9587f7a83b76282a30e31

    • SHA512

      1989ebf112987ab0a0d354fdc766e984630a650dd03ef6f6f3197c55ca0d60f9ecd02c767ce4b85810d1529dffc1324a022f5e3370022b717c79274db2fd6236

    • SSDEEP

      393216:wgi4sUxk7vRiT+huvwd1wtmvBICRkaKgUbs7vCiT9PNo80ptadC9XnYTFwUk5v:Bx+d/ooYtuMaKvQ7vCf80ptadC9XnVNv

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks